id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-31751 | The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. | [
"cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-hfrj-wfxw-vvw4 | IrfanView 4.44 (32bit) with FPX Plugin 4.47 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "User Mode Write AV starting at FPX!FPX_GetScanDevicePropertyGroup+0x000000000000a529." | [] |
|
GHSA-pxr2-xgv2-7cq3 | Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Popups). Supported versions that are affected are 12.2.4-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] |
|
GHSA-h9pw-955p-cqrc | Texas Instruments BLE-STACK v2.2.1 for SimpleLink CC2640 and CC2650 devices allows remote attackers to execute arbitrary code via a malformed packet that triggers a buffer overflow. | [] |
|
CVE-2007-1588 | server.cpp in MyServer 0.8.5 calls Process::setuid before calling Process::setgid and thus does not properly drop privileges, which might allow remote attackers to execute CGI programs with unintended privileges. | [
"cpe:2.3:a:myserver:myserver:0.8.5:*:*:*:*:*:*:*"
] |
|
CVE-2023-30490 | WordPress Easing Slider plugin <= 3.0.8 - Plugin Settings Reset Vulnerability | Missing Authorization vulnerability in Matthew Ruddy Easing Slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easing Slider : from n/a through 3.0.8. | [] |
GHSA-mhrw-cvv9-pwvf | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Chris Yee MomentoPress for Momento360 plugin <= 1.0.1 versions. | [] |
|
GHSA-gpqg-9388-qcwr | A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability. | [] |
|
CVE-2021-29962 | Firefox for Android would become unstable and hard-to-recover when a website opened too many popups. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*"
] |
|
CVE-1999-0444 | Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files. | [
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-47014 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
CVE-2019-5967 | Cross-site scripting vulnerability in Joruri CMS 2017 Release2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:joruri:joruri_cms_2017:*:*:*:*:*:*:*:*"
] |
|
CVE-2005-3142 | Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header. | [
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_file_servers:*:*:*:*:*",
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_workstations:*:*:*:*:*",
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal_pro:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kaspersky_lab:kaspersky_personal_security_suite:1.1:*:*:*:*:*:*:*"
] |
|
GHSA-67rq-xjmx-ww89 | Pivotal Apps Manager Release, versions 665.0.x prior to 665.0.28, versions 666.0.x prior to 666.0.21, versions 667.0.x prior to 667.0.7, contain an invitation service that accepts HTTP. A remote unauthenticated user could listen to network traffic and gain access to the authorization credentials used to make the invitation requests. | [] |
|
CVE-2019-1727 | Cisco NX-OS Software Python Parser Privilege Escalation Vulnerability | A vulnerability in the Python scripting subsystem of Cisco NX-OS Software could allow an authenticated, local attacker to escape the Python parser and issue arbitrary commands to elevate the attacker's privilege level. The vulnerability is due to insufficient sanitization of user-supplied parameters that are passed to certain Python functions in the scripting sandbox of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands to elevate the attacker's privilege level. To exploit this vulnerability, the attacker must have local access and be authenticated to the targeted device with administrative or Python execution privileges. These requirements could limit the possibility of a successful exploit. | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*"
] |
CVE-2008-5997 | Absolute path traversal vulnerability in admin/fileKontrola/browser.asp in Omnicom Content Platform (OCP) 2.0 allows remote attackers to list arbitrary directories via a full pathname in the root parameter. | [
"cpe:2.3:a:ocp2:omnicom_content_platform:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-7w58-2c67-8xhv | A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. | [] |
|
CVE-2025-21742 | usbnet: ipheth: use static NDP16 location in URB | In the Linux kernel, the following vulnerability has been resolved:
usbnet: ipheth: use static NDP16 location in URB
Original code allowed for the start of NDP16 to be anywhere within the
URB based on the `wNdpIndex` value in NTH16. Only the start position of
NDP16 was checked, so it was possible for even the fixed-length part
of NDP16 to extend past the end of URB, leading to an out-of-bounds
read.
On iOS devices, the NDP16 header always directly follows NTH16. Rely on
and check for this specific format.
This, along with NCM-specific minimal URB length check that already
exists, will ensure that the fixed-length part of NDP16 plus a set
amount of DPEs fit within the URB.
Note that this commit alone does not fully address the OoB read.
The limit on the amount of DPEs needs to be enforced separately. | [] |
GHSA-h2qf-prm2-vch5 | Format string vulnerability in AOL Instant Messenger (AIM) 4.1.2010 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by transferring a file whose name includes format characters. | [] |
|
GHSA-jj7q-x98p-6g69 | An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php form_field5[label] parameter. | [] |
|
CVE-2017-15214 | Stored XSS vulnerability in Flyspray 1.0-rc4 before 1.0-rc6 allows an authenticated user to inject JavaScript to gain administrator privileges and also to execute JavaScript against other users (including unauthenticated users), via the name, title, or id parameter to plugins/dokuwiki/lib/plugins/changelinks/syntax.php. | [
"cpe:2.3:a:flyspray:flyspray:1.0:rc4:*:*:*:*:*:*"
] |
|
CVE-2005-4766 | BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP5 and earlier, do not encrypt multicast traffic, which might allow remote attackers to read sensitive cluster synchronization messages by sniffing the multicast traffic. | [
"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*"
] |
|
CVE-2025-47660 | WordPress WC Affiliate <= 2.9.1 - PHP Object Injection Vulnerability | Deserialization of Untrusted Data vulnerability in Codexpert, Inc WC Affiliate allows Object Injection. This issue affects WC Affiliate: from n/a through 2.9.1. | [] |
CVE-2025-27175 | InDesign Desktop | Out-of-bounds Write (CWE-787) | InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
GHSA-39vm-rvwh-q86j | ImpressCMS Cross-site Scripting vulnerability via quicksearch_ContentContent parameter | Cross-site scripting (XSS) vulnerability in modules/content/admin/content.php in ImpressCMS 1.2.3 Final, and possibly other versions before 1.2.4, allows remote attackers to inject arbitrary web script or HTML via the quicksearch_ContentContent parameter. | [] |
GHSA-74ph-965p-2jc2 | Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution. | [] |
|
GHSA-53rq-8pvf-x2h9 | Remote Code Execution can occur in Simple Water Refilling Station Management System 1.0 via the System Logo option on the system_info page in classes/SystemSettings.php with an update_settings action. | [] |
|
CVE-2015-0383 | Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot. | [
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update75:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update75:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r27.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.3.4:*:*:*:*:*:*:*"
] |
|
GHSA-5q5m-mjqc-gj8w | Static code injection vulnerability in process.php in AimStats 3.2 allows remote attackers to inject PHP code into config.php via the number parameter in an update action. | [] |
|
GHSA-p89w-8r2h-7mjp | ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header. | [] |
|
GHSA-5g6v-9fxp-hvx4 | Secure Boot Security Feature Bypass Vulnerability | [] |
|
CVE-2008-4102 | Joomla! 1.5 before 1.5.7 initializes PHP's PRNG with a weak seed, which makes it easier for attackers to guess the pseudo-random values produced by PHP's mt_rand function, as demonstrated by guessing password reset tokens, a different vulnerability than CVE-2008-3681. | [
"cpe:2.3:a:joomla:joomla:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:1.5.6:*:*:*:*:*:*:*"
] |
|
CVE-2004-1617 | Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value. | [
"cpe:2.3:a:university_of_kansas:lynx:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.2_rel1:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.3_dev22:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.3_pre5:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.3_rel1:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.4_rel1:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev2:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev3:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev4:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev5:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_kansas:lynx:2.8.5_dev8:*:*:*:*:*:*:*"
] |
|
CVE-2022-49593 | tcp: Fix a data-race around sysctl_tcp_probe_interval. | In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctl_tcp_probe_interval.
While reading sysctl_tcp_probe_interval, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader. | [] |
CVE-2018-7788 | A CWE-255 Credentials Management vulnerability exists in Modicon Quantum with firmware versions prior to V2.40. which could cause a Denial Of Service when using a Telnet connection. | [
"cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-5254 | Arista EOS before 4.20.2F allows remote BGP peers to cause a denial of service (Rib agent restart) via a malformed path attribute in an UPDATE message. | [
"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-9377 | Heap-based buffer overflow in the nbns_spoof function in plug-ins/nbns_spoof/nbns_spoof.c in Ettercap 0.8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a large netbios packet. | [
"cpe:2.3:a:ettercap-project:ettercap:0.8.1:*:*:*:*:*:*:*"
] |
|
GHSA-wmmh-xgc6-xjh2 | An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request. | [] |
|
CVE-2021-31507 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12653. | [
"cpe:2.3:a:opentext:brava\\!_desktop:16.6.3.84:*:*:*:*:*:*:*"
] |
|
CVE-2023-34962 | Incorrect access control in Chamilo v1.11.x up to v1.11.18 allows a student to arbitrarily access and modify another student's personal notes. | [
"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*"
] |
|
GHSA-gw3m-4x3x-q7gc | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Post Custom Templates Lite allows Stored XSS. This issue affects Post Custom Templates Lite: from n/a through 1.14. | [] |
|
GHSA-m4qw-fm6j-8h62 | In MIELE XGW 3000 ZigBee Gateway before 2.4.0, the Password Change Function does not require knowledge of the old password. This can be exploited in conjunction with CVE-2019-20480. | [] |
|
GHSA-6r8g-h8h9-fx3q | Potential Time-of-Check to Time-of Use (TOCTOU) vulnerabilities have been identified in the HP BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. | [] |
|
CVE-2010-4425 | Unspecified vulnerability in the Oracle BI Publisher component in Oracle Fusion Middleware 10.1.3.3.2, 10.1.3.4.0, and 10.1.3.4.1 allows remote authenticated users to affect integrity via unknown vectors related to Web Server. | [
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.4.1:*:*:*:*:*:*:*"
] |
|
GHSA-998q-gh7x-jc4m | Array index error in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified "types of Adobe Flash code." | [] |
|
CVE-2025-4777 | PHPGurukul Park Ticketing Management System view-foreigner-ticket.php sql injection | A vulnerability was found in PHPGurukul Park Ticketing Management System 2.0. It has been classified as critical. This affects an unknown part of the file /view-foreigner-ticket.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-h7pq-fm7p-5x88 | Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23270. | [] |
|
GHSA-95j3-3r8c-7w6p | Permissions, Privileges, and Access Controls in TA in Snapdragon Mobile has an options that allows RPMB erase for secure devices in versions SD 210/SD 212/SD 205, SD 845, SD 850. | [] |
|
GHSA-5jjc-r23c-5j3p | SQL injection vulnerability in Packers and Movers Management System v.1.0 allows a remote attacker to execute arbitrary code via crafted payload to the /mpms/admin/?page=user/manage_user&id file. | [] |
|
CVE-2001-0694 | Directory traversal vulnerability in WFTPD 3.00 R5 allows a remote attacker to view arbitrary files via a dot dot attack in the CD command. | [
"cpe:2.3:a:texas_imperial_software:wftpd:3.00_r5:*:*:*:*:*:*:*"
] |
|
CVE-2017-0901 | RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem. | [
"cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-r659-h3gg-4vrp | Improper access control vulnerability in CONPROSYS HMI System (CHS) Ver.3.4.5 and earlier allows a remote unauthenticated attacker to bypass access restriction and obtain the server certificate including the private key of the product. | [] |
|
GHSA-4gmg-r65m-fr2x | ** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Brik firmware version 7.2.x and earlier allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue. | [] |
|
GHSA-6qhf-x255-q8qf | The Web_Links module in PHP-Nuke 6.0 through 6.5 final allows remote attackers to obtain the full web server path via an invalid cid parameter that is non-numeric or null, which leaks the pathname in an error message. | [] |
|
CVE-2024-10606 | WP Travel Engine <= 6.2.1 - Missing Authorization to Authenticated (Contributor+) Plugin Settings Update | The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpte_onboard_save_function_callback() function in all versions up to, and including, 6.2.1. This makes it possible for authenticated attackers, with contributor-level access and above, to modify several settings that could have an impact such as lost revenue and page updates. | [] |
CVE-2015-4676 | SQL injection vulnerability in ticket.php in TickFa 1.x allows remote authenticated users to execute arbitrary SQL commands via the tid parameter in a read action. | [
"cpe:2.3:a:aftab:tickfa:*:*:*:*:*:*:*:*"
] |
|
GHSA-h538-r9x6-rcmc | LavaLite vulnerable to Cross Site Scripting | LavaLite v9.0.0 is vulnerable to Cross Site Scripting (XSS). | [] |
GHSA-9354-h3w8-49p7 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Food Menu 1.0. This issue affects some unknown processing of the file /endpoint/delete-menu.php. The manipulation of the argument menu leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2021-40710 | Adobe Premiere Pro 2021 SVG File Parsing Leads to Memory Corruption | Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability. | [
"cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2021-27582 | org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest. | [
"cpe:2.3:a:mitreid:connect:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-3880 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 6.1.2, iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-4pfw-m3q5-m9v8 | Example applications (Exampleapps) in ColdFusion Server 4.x do not properly restrict prevent access from outside the local host's domain, which allows remote attackers to conduct upload, read, or execute files by spoofing the "HTTP Host" (CGI.Host) variable in (1) the "Web Publish" example script, and (2) the "Email" example script. | [] |
|
CVE-2024-26889 | Bluetooth: hci_core: Fix possible buffer overflow | In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Fix possible buffer overflow
struct hci_dev_info has a fixed size name[8] field so in the event that
hdev->name is bigger than that strcpy would attempt to write past its
size, so this fixes this problem by switching to use strscpy. | [] |
GHSA-x3qv-mvh4-mgq3 | Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2018-17827 | HisiPHP 1.0.8 allows remote attackers to execute arbitrary PHP code by editing a plugin's name to contain that code. This name is then injected into app/admin/model/AdminPlugins.php. | [
"cpe:2.3:a:hisiphp:hisiphp:1.0.8:*:*:*:*:*:*:*"
] |
|
CVE-2021-31222 | SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed. | [
"cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-39122 | In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
GHSA-6xx8-6c67-fx9v | The (1) settings.php and (2) subscribers.php scripts in Open Newsletter 2.5 and earlier do not exit when authentication fails, which allows remote attackers to perform unauthorized administrative actions, or execute arbitrary code in conjunction with another vulnerability. | [] |
|
GHSA-4cww-f7w5-x525 | Stack consumption in trust-dns-server | There's a stack overflow leading to a crash and potential DOS when processing additional records for return of MX or SRV record types from the server. This is only possible when a zone is configured with a null target for MX or SRV records. Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to 0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided. | [] |
CVE-2023-38870 | A SQL injection vulnerability exists in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1. The cash book has a feature to list accomplishments by category, and the 'category_id' parameter is vulnerable to SQL Injection. | [
"cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*",
"cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*"
] |
|
CVE-2012-6563 | engine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors. | [
"cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elgg:elgg:1.8.3:*:*:*:*:*:*:*"
] |
|
CVE-2017-6148 | Responses to SOCKS proxy requests made through F5 BIG-IP version 13.0.0, 12.0.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5 may cause a disruption of services provided by TMM. The data plane is impacted and exposed only when a SOCKS proxy profile is attached to a Virtual Server. The control plane is not impacted by this vulnerability. | [
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:13.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-wv6j-phcv-pxw6 | IBM QRadar WinCollect Agent 10.0 and 10.0.1 could allow an attacker to obtain sensitive information due to missing best practices. IBM X-Force ID: 213549. | [] |
|
GHSA-87g7-2h8c-64r2 | A denial of service vulnerability in Audioserver could enable a local malicious application to cause a device hang or reboot. This issue is rated as Low due to the possibility of a temporary denial of service. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32095713. | [] |
|
CVE-2019-9436 | In the Android kernel in the bootloader there is a possible secure boot bypass. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-hq38-64gm-3w2c | A path traversal vulnerability exists in the `install` and `uninstall` API endpoints of parisneo/lollms-webui version V12 (Strawberry). This vulnerability allows attackers to create or delete directories with arbitrary paths on the system. The issue arises due to insufficient sanitization of user-supplied input, which can be exploited to traverse directories outside the intended path. | [] |
|
GHSA-r2w9-89x2-vccf | FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font. | [] |
|
CVE-2023-3698 | A Command injection vulnerability was found on Printer service of ADM | Printer service fails to adequately handle user input, allowing an remote unauthorized users to navigate beyond the intended directory structure and delete files. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
| [
"cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:*"
] |
GHSA-6xc9-39gx-2ch4 | calendar/managesubscriptions.php in the Manage Subscriptions implementation in Moodle 2.4.x before 2.4.1 omits a capability check, which allows remote authenticated users to remove course-level calendar subscriptions by leveraging the student role and sending an iCalendar object. | [] |
|
CVE-2023-2205 | Campcodes Retro Basketball Shoes Online Store login.php sql injection | A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226970 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:retro_basketball_shoes_online_store_project:retro_basketball_shoes_online_store:1.0:*:*:*:*:*:*:*"
] |
CVE-2023-0728 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. | [
"cpe:2.3:a:wickedplugins:wicked_folders:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-q75q-75h3-mpqm | SMM call out in all Intel Branded NUC Kits allows a local privileged user to access the System Management Mode and take full control of the platform. | [] |
|
CVE-2015-5442 | Unspecified vulnerability in HP Software Update before 5.005.002.002 allows local users to gain privileges via unknown vectors. | [
"cpe:2.3:a:hp:software_update:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-3610 | SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition. | [
"cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-0708 | HP USB 2.0 Floppy Drive Key product options (1) 442084-B21 and (2) 442085-B21 for certain HP ProLiant servers contain the (a) W32.Fakerecy and (b) W32.SillyFDC worms, which might be launched if the server does not have up-to-date detection. | [
"cpe:2.3:h:hp:442084-b21:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:442085-b21:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl20pg4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl25pg2:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl45pg2:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl260c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl460c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl465c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl465cg5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl480c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl680cg5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl685c:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:bl685cg5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl120g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl140g3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl145g3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl160g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl165g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl180:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl180g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl185g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl320g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl365g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl380g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl385g2:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl385g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:dl580g4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml110g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml115:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml115g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml150g3:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml150g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml310g4:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml310g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml350g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml370g5:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant:ml570g4:*:*:*:*:*:*:*"
] |
|
CVE-2017-0621 | An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-35399703. References: QC-CR#831322. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*"
] |
|
GHSA-crxx-35wq-w63c | HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace. | [] |
|
GHSA-267q-rqmv-wvqq | Gibbon CMS v22.0.01 was discovered to contain a cross-site scripting (XSS) vulnerability, that allows attackers to inject arbitrary script via name parameters. | [] |
|
GHSA-wr95-h8f6-c4gf | IBM solidDB 06.00.1018 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a packet with an 0x11 value in a certain "type" field. | [] |
|
CVE-2021-24180 | Related Posts for WordPress < 2.0.4 - Authenticated Reflected Cross-Site Scripting (XSS) | Unvalidated input and lack of output encoding within the Related Posts for WordPress plugin before 2.0.4 lead to a Reflected Cross-Site Scripting (XSS) vulnerability within the 'lang' GET parameter while editing a post, triggered when users with the capability of editing posts access a malicious URL. | [
"cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-36032 | ReactPHP's HTTP server parses encoded cookie names so malicious `__Host-` and `__Secure-` cookies can be sent | ReactPHP HTTP is a streaming HTTP client and server implementation for ReactPHP. In ReactPHP's HTTP server component versions starting with 0.7.0 and prior to 1.7.0, when ReactPHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like `__Host-` and `__Secure-` confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. This issue is fixed in ReactPHP HTTP version 1.7.0. As a workaround, Infrastructure or DevOps can place a reverse proxy in front of the ReactPHP HTTP server to filter out any unexpected `Cookie` request headers. | [
"cpe:2.3:a:reactphp:http:*:*:*:*:*:*:*:*"
] |
GHSA-h988-5rg9-mhh9 | The Server Admin tool in servermgr_ipfilter for Mac OS X 10.4 to 10.4.2, when using multiple subnets and Address Groups, does not always properly write firewall rules to the Active Rules when certain conditions occur, which could result in firewall policies that are less restrictive than intended by the administrator. | [] |
|
GHSA-rrj9-vv37-478g | Operational restrictions bypass vulnerability in E-mail of Cybozu Garoon 4.0.0 to 5.0.2 allows a remote authenticated attacker to alter the data of Portal without the appropriate privilege. | [] |
|
CVE-2019-6791 | An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Incorrect Access Control (issue 3 of 3). When a project with visibility more permissive than the target group is imported, it will retain its prior visibility. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2016-8905 | SQL injection vulnerability in the JSONTags servlet in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the sort parameter. | [
"cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*"
] |
|
CVE-2000-0565 | SmartFTP Daemon 0.2 allows a local user to access arbitrary files by uploading and specifying an alternate user configuration file via a .. (dot dot) attack. | [
"cpe:2.3:a:mindstorm:smartftp_daemon:0.2:*:*:*:*:*:*:*"
] |
|
GHSA-9pcc-mx54-f9hq | An issue was discovered in GitLab Community and Enterprise Edition 11.11. A specially crafted payload would allow an authenticated malicious user to execute commands remotely through the repository download feature. It allows Command Injection. | [] |
|
GHSA-8gm9-f3hp-wq3x | Unspecified vulnerability in Oracle OpenSolaris allows local users to affect availability via unknown vectors related to Kernel/File System. | [] |
|
CVE-2014-4718 | Multiple cross-site request forgery (CSRF) vulnerabilities in Lunar CMS before 3.3-3 allow remote attackers to hijack the authentication of administrators for requests that (1) add Super users via a request to admin/user_create.php or conduct cross-site scripting (XSS) attacks via the (2) email or (3) subject parameter in contact_form.ext.php to admin/extensions.php. | [
"cpe:2.3:a:lunarcms:lunar_cms:*:1:*:*:*:*:*:*",
"cpe:2.3:a:lunarcms:lunar_cms:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lunarcms:lunar_cms:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lunarcms:lunar_cms:3.3:*:*:*:*:*:*:*"
] |
|
CVE-2019-4236 | A IBM Spectrum Protect 7.l client backup or archive operation running for an HP-UX VxFS object is silently skipping Access Control List (ACL) entries from backup or archive if there are more than twelve ACL entries associated with the object in total. As a result, it could allow a local attacker to restore or retrieve the object with incorrect ACL entries. IBM X-Force ID: 159418. | [
"cpe:2.3:a:ibm:spectrum_protect:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.